Training Video Course

312-50v10: Certified Ethical Hacker v10 Exam

PDFs and exam guides are not so efficient, right? Prepare for your ECCouncil examination with our training course. The 312-50v10 course contains a complete batch of videos that will provide you with profound and thorough knowledge related to ECCouncil certification exam. Pass the ECCouncil 312-50v10 test with flying colors.

Rating
4.1rating
Students
117
Duration
15:48:58 h
$16.49
$14.99

Curriculum for 312-50v10 Certification Video Course

Name of Video Time
Play Video: Create A VeraCrypt Container to Protect Your Laptop or Desktop
1. Create A VeraCrypt Container to Protect Your Laptop or Desktop
10:48
Play Video: Build a Manual Lab 01
2. Build a Manual Lab 01
3:47
Play Video: Lab Legalities
3. Lab Legalities
2:44
Play Video: Getting to Know Your Win2k VM
4. Getting to Know Your Win2k VM
5:25
Play Video: Getting to Know Your XPAttacker VM
5. Getting to Know Your XPAttacker VM
3:04
Play Video: Getting to Know You Win7 VM
6. Getting to Know You Win7 VM
3:56
Play Video: Getting to Know Your Win2k3-AD
7. Getting to Know Your Win2k3-AD
1:27
Play Video: Getting to Know Your WebApp
8. Getting to Know Your WebApp
1:31
Play Video: Putting Our Lab Together Step By Step
9. Putting Our Lab Together Step By Step
12:45
Play Video: Tying everying together in our Lab
10. Tying everying together in our Lab
5:44
Name of Video Time
Play Video: Introduction to Pentesting and Ethical Hacking
1. Introduction to Pentesting and Ethical Hacking
0:31
Play Video: Teaser-How Hackers Obtain Serial Numbers Even VMware Workstation Pro
2. Teaser-How Hackers Obtain Serial Numbers Even VMware Workstation Pro
4:58
Play Video: Defintion of a Penetration Test
3. Defintion of a Penetration Test
1:46
Play Video: The Evolving Threat
4. The Evolving Threat
1:49
Play Video: The Vulnerabilty Lifecycle
5. The Vulnerabilty Lifecycle
2:15
Play Video: Map.Norsecorp.com
6. Map.Norsecorp.com
1:56
Play Video: Botnet Definition
7. Botnet Definition
5:12
Play Video: Defense in Depth
8. Defense in Depth
4:47
Play Video: MetaData
9. MetaData
3:29
Play Video: Types of PenTests
10. Types of PenTests
4:47
Play Video: Types of Hackers
11. Types of Hackers
1:31
Play Video: Common Definitions
12. Common Definitions
1:43
Play Video: Hacker vs. Penetration Tester
13. Hacker vs. Penetration Tester
5:27
Play Video: Penetration Testing Terminology
14. Penetration Testing Terminology
3:10
Play Video: Essential Terminology
15. Essential Terminology
3:51
Play Video: OSSTMM Methodology
16. OSSTMM Methodology
8:42
Play Video: Tools vs Technique
17. Tools vs Technique
4:45
Play Video: Things are not always as they seem
18. Things are not always as they seem
1:13
Play Video: Calculating Risk & Formulas
19. Calculating Risk & Formulas
2:48
Play Video: Analyzing Findings
20. Analyzing Findings
0:44
Play Video: Calculating SLE, ARO, ALE
21. Calculating SLE, ARO, ALE
1:06
Play Video: Other Penetration Testing Methodologies
22. Other Penetration Testing Methodologies
3:14
Name of Video Time
Play Video: Introduction to Footprinting
1. Introduction to Footprinting
0:43
Play Video: What Information is Gathered by the Hacker
2. What Information is Gathered by the Hacker
5:37
Play Video: Methods of Obtaining Information And Physical Access
3. Methods of Obtaining Information And Physical Access
1:24
Play Video: Social Access
4. Social Access
4:27
Play Video: Digital Access
5. Digital Access
3:02
Play Video: Passive vs Active Reconnaissance
6. Passive vs Active Reconnaissance
2:14
Play Video: Footprinting Defined
7. Footprinting Defined
1:32
Play Video: Exercise: Footprinting Tool: Maltego
8. Exercise: Footprinting Tool: Maltego
2:03
Play Video: Most Powerful Hacking Tool on the Internet Today
9. Most Powerful Hacking Tool on the Internet Today
4:15
Play Video: Instructor Demonstration - The Power of Google -A
10. Instructor Demonstration - The Power of Google -A
5:44
Play Video: Instructor Demonstration - The Power of Google -B
11. Instructor Demonstration - The Power of Google -B
10:15
Play Video: Instructor Demo: GoogleAlerts
12. Instructor Demo: GoogleAlerts
4:24
Play Video: Removing Searchable Content
13. Removing Searchable Content
4:55
Play Video: Internet Archive: The WayBack Machine
14. Internet Archive: The WayBack Machine
6:43
Play Video: Domain Name Registration-WhoIs Information
15. Domain Name Registration-WhoIs Information
1:19
Play Video: Instructor Demonstation - CentralOps
16. Instructor Demonstation - CentralOps
6:14
Play Video: DNS Databases
17. DNS Databases
3:20
Play Video: Traceroute Operation
18. Traceroute Operation
5:30
Play Video: InstructorDemonstration: Online Tools
19. InstructorDemonstration: Online Tools
4:19
Play Video: Spokeo - No Refuge for the Wealthy
20. Spokeo - No Refuge for the Wealthy
4:59
Play Video: Netcraft, DoaminsbyProxy, Countermeasures
21. Netcraft, DoaminsbyProxy, Countermeasures
8:43
Name of Video Time
Play Video: Introduction to Linux
1. Introduction to Linux
0:24
Play Video: Linux History - Linus + Minux = Linux
2. Linux History - Linus + Minux = Linux
2:29
Play Video: Linux GUI Desktops
3. Linux GUI Desktops
2:09
Play Video: Linux Shell Linux Bash Shell
4. Linux Shell Linux Bash Shell
2:31
Play Video: Passwd & Shadow File Formats
5. Passwd & Shadow File Formats
1:52
Play Video: InstructorDemo:User Account Management
6. InstructorDemo:User Account Management
6:20
Play Video: Tarballs & Zips & Installing VMware Tools
7. Tarballs & Zips & Installing VMware Tools
5:30
Play Video: Compiling Programs in Linux, Shell Shock, Poodle Vulnerability
8. Compiling Programs in Linux, Shell Shock, Poodle Vulnerability
2:44
Play Video: Most Popular Linux Security Distribution
9. Most Popular Linux Security Distribution
1:58
Name of Video Time
Play Video: Introduction to Port Scanning
1. Introduction to Port Scanning
0:15
Play Video: Introduction to Port Scanning
2. Introduction to Port Scanning
2:31
Play Video: TCP/IP Stack
3. TCP/IP Stack
6:22
Play Video: TCP 3-Way HandShake
4. TCP 3-Way HandShake
5:03
Play Video: NMap ServiceVersion Detection And Demo
5. NMap ServiceVersion Detection And Demo
1:44
Play Video: Instructor Demonstration-Engage, NmapScans
6. Instructor Demonstration-Engage, NmapScans
8:02
Play Video: Hping3, NMap -O
7. Hping3, NMap -O
1:32
Play Video: Fuzzy Logic
8. Fuzzy Logic
1:30
Play Video: Countermeasures: Scanning
9. Countermeasures: Scanning
2:20
Name of Video Time
Play Video: Intro to Enumeration
1. Intro to Enumeration
0:17
Play Video: Grabbing Banners
2. Grabbing Banners
4:25
Play Video: Shodan
3. Shodan
5:20
Play Video: ZoneTransfers
4. ZoneTransfers
5:00
Play Video: DNS Enumeration
5. DNS Enumeration
4:26
Play Video: SNMP Countermeasures, AD and AD Countermeasures
6. SNMP Countermeasures, AD and AD Countermeasures
4:13
Play Video: Null Sessions
7. Null Sessions
8:39
Name of Video Time
Play Video: Intro Into Cryptography
1. Intro Into Cryptography
0:30
Play Video: Beginings of Cryptography
2. Beginings of Cryptography
4:36
Play Video: Implementation, Stream Cipher, Block Cipher and the Enigima
3. Implementation, Stream Cipher, Block Cipher and the Enigima
8:54
Play Video: Asymetric Encryption, Hybrid Encryption, Comparison of Algorithims, Key Exchange
4. Asymetric Encryption, Hybrid Encryption, Comparison of Algorithims, Key Exchange
5:07
Play Video: Hashing, Hashing Collisions, Common Hash Algorithms
5. Hashing, Hashing Collisions, Common Hash Algorithms
9:38
Play Video: Ransomware
6. Ransomware
3:07
Play Video: IPSec and SSH
7. IPSec and SSH
3:46
Play Video: PKI Applications, Quantum Crypto and VeraCrypt
8. PKI Applications, Quantum Crypto and VeraCrypt
3:27
Name of Video Time
Play Video: Introduction to Malware and How The Internet Makes Money
1. Introduction to Malware and How The Internet Makes Money
1:00
Play Video: Things that make the World Go Around - Well as far as the Internet is concerned
2. Things that make the World Go Around - Well as far as the Internet is concerned
9:10
Play Video: Trojans and Back Doors
3. Trojans and Back Doors
6:17
Play Video: Defining Malware: Viruses and Worms
4. Defining Malware: Viruses and Worms
7:13
Play Video: Defining Malware: Spyware
5. Defining Malware: Spyware
5:35
Play Video: Data Loss Prevention (DLP) and other Creepy things
6. Data Loss Prevention (DLP) and other Creepy things
10:31
Play Video: Distributing Malware
7. Distributing Malware
6:19
Play Video: Malware Capabilities
8. Malware Capabilities
5:27
Play Video: Auto Starting Malware
9. Auto Starting Malware
1:44
Play Video: Tool: Netcat
10. Tool: Netcat
3:41
Play Video: Demo: NetCat Procedure
11. Demo: NetCat Procedure
10:28
Play Video: Executable Wrappers
12. Executable Wrappers
4:22
Play Video: Instructor Demo: Executeable Wrappers 1
13. Instructor Demo: Executeable Wrappers 1
8:51
Play Video: Instructor Demo: Executeable Wrappers 2
14. Instructor Demo: Executeable Wrappers 2
1:53
Play Video: Malware Avoiding Detection
15. Malware Avoiding Detection
4:33
Play Video: Malware Countermeasures 1
16. Malware Countermeasures 1
8:10
Play Video: Malware Countermeasures 2
17. Malware Countermeasures 2
6:39
Name of Video Time
Play Video: Introduction to System Hacking Introduction
1. Introduction to System Hacking Introduction
1:00
Play Video: Types of Password Attacks, Keystroke Loggers
2. Types of Password Attacks, Keystroke Loggers
5:44
Play Video: Password Guessing Online
3. Password Guessing Online
7:44
Play Video: Cracking Windows Passwords - A
4. Cracking Windows Passwords - A
3:25
Play Video: Cracking Windows Passwords - B
5. Cracking Windows Passwords - B
8:32
Play Video: Cracking Windows Passwords - C
6. Cracking Windows Passwords - C
7:00
Play Video: Cracking Windows Passwords - D
7. Cracking Windows Passwords - D
8:00
Play Video: Cracking Windows Passwords - E
8. Cracking Windows Passwords - E
8:25
Play Video: Countermeasures: Stealing the Passwords, Syskey, Salting
9. Countermeasures: Stealing the Passwords, Syskey, Salting
8:41
Play Video: Cloud Cracking Techniques
10. Cloud Cracking Techniques
1:55
Play Video: Generating Rainbow Tables, Free Rainbow Tables
11. Generating Rainbow Tables, Free Rainbow Tables
3:17
Play Video: Password Hash Insertion Attack
12. Password Hash Insertion Attack
9:20
Play Video: Demonstration MimiKatz
13. Demonstration MimiKatz
10:59
Play Video: Privilege Escalation, Countermeasures
14. Privilege Escalation, Countermeasures
5:37
Play Video: Covering Tracks, Disable Auditing, Clearing the Event Log
15. Covering Tracks, Disable Auditing, Clearing the Event Log
3:04
Play Video: Alternate Data Streams Demonstration - A
16. Alternate Data Streams Demonstration - A
8:07
Play Video: Alternate Data Streams Demonstration - B
17. Alternate Data Streams Demonstration - B
11:55
Play Video: Alternate Data Streams Demonstration - C
18. Alternate Data Streams Demonstration - C
10:38
Play Video: Anonymizers - JAP
19. Anonymizers - JAP
3:42
Play Video: Steganography
20. Steganography
11:41
Play Video: Virtually Complete Secrecy, TOR
21. Virtually Complete Secrecy, TOR
11:02
Play Video: RootKits - Overview
22. RootKits - Overview
8:39
Play Video: RootKits - Frightening Demo
23. RootKits - Frightening Demo
13:22
Play Video: Root Kit Countermeasures, Tokens and Smart Cards
24. Root Kit Countermeasures, Tokens and Smart Cards
11:19
Name of Video Time
Play Video: Introduction to Advanced System Explotation
1. Introduction to Advanced System Explotation
1:00
Play Video: How do Exploits Work?
2. How do Exploits Work?
5:08
Play Video: Buffer Over Flows Introduction I do when Speaking at a Conference
3. Buffer Over Flows Introduction I do when Speaking at a Conference
5:59
Play Video: Processors and Stacks
4. Processors and Stacks
10:22
Play Video: Basic Types of Buffer Overflows And Demo 01
5. Basic Types of Buffer Overflows And Demo 01
10:53
Play Video: Basic Types of Buffer Overflows And Demo 02
6. Basic Types of Buffer Overflows And Demo 02
11:12
Play Video: Basic Types of Buffer Overflows And Demo 03
7. Basic Types of Buffer Overflows And Demo 03
9:27
Play Video: Stages of Exploit Development
8. Stages of Exploit Development
1:37
Play Video: Buffer Overflow Prevention
9. Buffer Overflow Prevention
7:54
Play Video: The Metasploit Project
10. The Metasploit Project
5:08
Play Video: Core Impact Overview
11. Core Impact Overview
5:09
Name of Video Time
Play Video: Introduction to Database Management Systems
1. Introduction to Database Management Systems
0:23
Play Video: Overview of Databases, Types of Databases, Relations of Databases
2. Overview of Databases, Types of Databases, Relations of Databases
7:15
Play Video: View of DBMS, Injecting a DBMS, Why SQL Injection, SQL Connection Properties
3. View of DBMS, Injecting a DBMS, Why SQL Injection, SQL Connection Properties
6:39
Play Video: SQL Injection Types, Stored Procedures, Shutdown, Locating SQL, Sensitive Info
4. SQL Injection Types, Stored Procedures, Shutdown, Locating SQL, Sensitive Info
9:21
Play Video: Hardening SQL Server
5. Hardening SQL Server
9:21
Play Video: SQL Injection Demo 1
6. SQL Injection Demo 1
9:54
Play Video: SQL Injection Demo 2
7. SQL Injection Demo 2
6:10
Play Video: SQL Injection Demo 3
8. SQL Injection Demo 3
4:03
Name of Video Time
Play Video: Introduction to WiFi and Mobile Hacking
1. Introduction to WiFi and Mobile Hacking
0:25
Play Video: WiFiNetwork Types, Widely Deployed Standards, A, B, G, 802.11n - MIMO, 802.11ac,
2. WiFiNetwork Types, Widely Deployed Standards, A, B, G, 802.11n - MIMO, 802.11ac,
4:08
Play Video: 802.11n - MIMO, 802.11ac, SSID, MAC Filtering, WEP, Weak IV Packets
3. 802.11n - MIMO, 802.11ac, SSID, MAC Filtering, WEP, Weak IV Packets
5:44
Play Video: XOR Basics, WEP Weaknesses
4. XOR Basics, WEP Weaknesses
3:26
Play Video: TKIP, WPA vs WEP, WPA MIC Vulnerabilty, WPA-PSK Encryption
5. TKIP, WPA vs WEP, WPA MIC Vulnerabilty, WPA-PSK Encryption
7:11
Play Video: Kismet, Aircrack-ng, Aireplay
6. Kismet, Aircrack-ng, Aireplay
2:53
Play Video: EAP Types, EAP Advantages/DisAdvantages, Typical Wired/Wireless Network
7. EAP Types, EAP Advantages/DisAdvantages, Typical Wired/Wireless Network
2:47
Play Video: Exercise/Assignment; Cracking WPA/WPA2 Password Preparation
8. Exercise/Assignment; Cracking WPA/WPA2 Password Preparation
12:44
Play Video: Exercise/Assignment; Cracking WPA/WPA2 Password - Solution
9. Exercise/Assignment; Cracking WPA/WPA2 Password - Solution
5:19
Name of Video Time
Play Video: Introduction to Sniffing
1. Introduction to Sniffing
0:17
Play Video: Packet Sniffers, PCap & WinPcap, Wireshark, TCP Reassembly, Packetyzer
2. Packet Sniffers, PCap & WinPcap, Wireshark, TCP Reassembly, Packetyzer
7:33
Play Video: TCP Dump & WinDump, Network Miner Wildpackets, Cain and Able, Passive Sniffing
3. TCP Dump & WinDump, Network Miner Wildpackets, Cain and Able, Passive Sniffing
4:16
Play Video: Active Sniffing & Methods, Switch Table Flooding
4. Active Sniffing & Methods, Switch Table Flooding
4:22
Play Video: Arp Cache Posioning
5. Arp Cache Posioning
6:00
Play Video: Arp Cache Posioning Tools and Countermeasures
6. Arp Cache Posioning Tools and Countermeasures
5:35
Play Video: Breaking SSL Traffic, Intercepting VoIP, Routing Protocols, RDP, Passwords and M
7. Breaking SSL Traffic, Intercepting VoIP, Routing Protocols, RDP, Passwords and M
6:18
Play Video: Exercise/Assignment Breaking SSL - Preparation
8. Exercise/Assignment Breaking SSL - Preparation
9:03
Play Video: Exercise/Assignment Breaking SSL - Solution
9. Exercise/Assignment Breaking SSL - Solution
5:19
Name of Video Time
Play Video: Introduction tp Firewalls, IDS and IPS WAF
1. Introduction tp Firewalls, IDS and IPS WAF
0:07
Play Video: Firewall - Your First Line of Defense
2. Firewall - Your First Line of Defense
6:35
Play Video: IDS Your Second Line of Defense
3. IDS Your Second Line of Defense
4:55
Play Video: Web Application Firewall and Evasion Techniques'
4. Web Application Firewall and Evasion Techniques'
7:45
Play Video: Behavioural Firewalls and IPS Systems
5. Behavioural Firewalls and IPS Systems
3:35
Name of Video Time
Play Video: Introduction to Web Application
1. Introduction to Web Application
0:41
Play Video: Common Security Threats, Need for Monitoring, SANS Seven MGT Errors
2. Common Security Threats, Need for Monitoring, SANS Seven MGT Errors
6:34
Play Video: Anatomy of a Web Attack, Web Attack Techniques, Typical Web App Componets
3. Anatomy of a Web Attack, Web Attack Techniques, Typical Web App Componets
5:12
Play Video: Logs Cancanolization and Other Attacks
4. Logs Cancanolization and Other Attacks
3:36
Play Video: Web App Scanner, HTTrack,HTTPrint, Proxies
5. Web App Scanner, HTTrack,HTTPrint, Proxies
7:07
Play Video: Directory Traversal & Other Common Vulnerabilties
6. Directory Traversal & Other Common Vulnerabilties
9:44
Play Video: XSS Demo and Countermeasures
7. XSS Demo and Countermeasures
8:46
Play Video: Common Ways to Attack Web Technologies, Cross Site Scripting (XSS)
8. Common Ways to Attack Web Technologies, Cross Site Scripting (XSS)
8:50
Play Video: Cross Site Request Forgery
9. Cross Site Request Forgery
6:03
Play Video: Cookies and Session Management
10. Cookies and Session Management
5:19
Play Video: OWASP Top 10
11. OWASP Top 10
7:05
Name of Video Time
Play Video: So your Ready To Take Your Test 1?
1. So your Ready To Take Your Test 1?
7:16
Name of Video Time
Play Video: Backing Up our Veracrypt Storage Enclosure for Saftey
1. Backing Up our Veracrypt Storage Enclosure for Saftey
5:14

ECCouncil CEH 312-50v10 Exam Dumps, Practice Test Questions

100% Latest & Updated ECCouncil CEH 312-50v10 Practice Test Questions, Exam Dumps & Verified Answers!
30 Days Free Updates, Instant Download!

ECCouncil 312-50v10 Premium Bundle
$69.97
$49.99

312-50v10 Premium Bundle

  • Premium File: 322 Questions & Answers. Last update: May 26, 2023
  • Training Course: 182 Video Lectures
  • Study Guide: 1299 Pages
  • Latest Questions
  • 100% Accurate Answers
  • Fast Exam Updates

312-50v10 Premium Bundle

ECCouncil 312-50v10 Premium Bundle
  • Premium File: 322 Questions & Answers. Last update: May 26, 2023
  • Training Course: 182 Video Lectures
  • Study Guide: 1299 Pages
  • Latest Questions
  • 100% Accurate Answers
  • Fast Exam Updates
$69.97
$49.99

Free 312-50v10 Exam Questions & 312-50v10 Dumps

File Name Size Votes
File Name
eccouncil.realtests.312-50v10.v2023-04-28.by.lucas.193q.vce
Size
371.35 KB
Votes
1
File Name
eccouncil.realtests.312-50v10.v2021-04-16.by.isabelle.193q.vce
Size
371.35 KB
Votes
2

ECCouncil 312-50v10 Training Course

Want verified and proven knowledge for Certified Ethical Hacker v10 Exam? Believe it's easy when you have ExamSnap's Certified Ethical Hacker v10 Exam certification video training course by your side which along with our ECCouncil 312-50v10 Exam Dumps & Practice Test questions provide a complete solution to pass your exam Read More.

Ethical Hacking Overview

20. Analyzing Findings

Now, when you go through and you actually stumble across some particular finding, you need to analyse that finding. It's really interesting because this is kind of a tongue twister. It can really kind of get you turned around backwards if you're not really careful. So I'm going to give you some examples of this in the questions that you're going to use. But the thing that you need to understand is that a false positive is something that's incorrectly identified. A false negative is something that's incorrectly rejected. A true negative is something that is correctly and correctly rejected. And a true positive is something that is correctly identified.

21. Calculating SLE, ARO, ALE

Okay, guys, just one last calculation, and we're going to end up wrapping this thing up. This is going to give us the capability with some of these formulas to calculate the single loss expectancy, an annualised rate of occurrence, and an annual loss expectancy, right? So let's give us an example of this. The single loss expectancy is, for example, $50,000 per event. Maybe something happens where a server is taken out and it's going to cost us $50,000 to fix it. With an annualised rate of occurrence of about 50%, the risk is expected to occur once every other year on average. So the annualized loss expectancy is equal to $50,000 times the aro, which is the annualised rate of occurrence or $25,000.

22. Other Penetration Testing Methodologies

Okay, guys, we're just about ready to wrap this particular section up. And one of the last things we're going to talk about is the penetration testing methodologies. And you probably thought, well, wait a minute, Tim. We've already talked about that. That was the one you said was the most popular, the O S St. model. And you're absolutely right. We did. We talked about this because it is indeed the most popular. It was written by a gentleman by the name of Peter Herzog. It's not necessarily the only methodology. There are other ones that can be used in a penetration test as well. There's one. For example, the NIST methodology for the National Institute of Standards and Technology They provide guidelines on network security testing.

Financial institutions tend to have their own. So this one happens to be for the Federal Financial Institution Examination Office, or FFIEC. And then lastly, we have this Information System Security Assessment Framework, all right? And you'll typically see it written as Oissg. You may also see it as an open system or Oissg. Now, you may be asking yourself, do I need to use all of these? And the answer is, no, you don't. You are typically told which methodology you should be using in the particular environment that you're bidding on. So if it's a bank or financial institution, it’s very likely you're going to be using the oFFIEC if it's pretty much anything else. In my experience, it's always been the OSS TMM, but that doesn't mean you couldn't create your own methodology.

Now remember, a methodology is nothing more than a set of steps to get to or achieve some goal. And so if everyone is doing the same steps and we're in sync, that means we both should arrive at the same determination. So there are companies that may take some ideas from the Ossmm and possibly some from this. You can move things around if you would like to, unless there is some reason in your organization they want to have it done in a particular way. But the biggest thing is that you've got to be consistent. You've got to do it this way every time, because you're going to be using these penetration tests, the ones from last year, the ones from six months ago, and so on, to compare to the results you have today. And it's interesting because some people look at things that need to be fixed right away, and others tend to shrug some of this off. And we'll talk about that more in the next particular section.

FootPrinting - Reconnaissance and Information Gathering

1. Introduction to Footprinting

In this section, we'll talk about the information that is gathered by the hacker. We'll discuss methods of obtaining information: physical access, social engineering access, digital access, passive versus active reconnaissance foot printing, and we'll discuss tools like Reconciliation and G foot printing tools like Multiage, the most powerful hacking tool on the internet today, and foot printing tools like in his Lookup traceroute and the Edge database. We'll discuss Google and its query operators, the Internet Arcade, the Way back Machine, domain name registration, who is the operator, as well as demonstrations on various topics.

2. What Information is Gathered by the Hacker

In this particular lecture, we're going to take a look at what information is gathered by the hacker. The idea behind footprinting a network is to get an idea of how much of the layout and specifications we have without altering the target. Like a bank robber in a heist film, you would look to obtain blueprints of the network and company, including what type of alarm system they have, those kinds of things. Think of Ocean's Eleven or one of those types of films where they plan this out meticulously. They know exactly how much time it takes to get from point A to point B. That's the whole idea behind Footprinting in our Footprinting that we're going to do ourselves. This is going to include things like what servers are running, what versions of software that they're running, how the internal network is actually configured, and what formats they use for internal usernames and email addresses.

Once this blueprint is complete, you'll be in a much better position to see what methods, routes, and exploits your attack will actually take. The first thing the hacker is going to want to know is who owns this system. Is it going to be someone who would perhaps chase after them if they attempt to break in? Let's take an example of Kindergare daycare and then compare that with Bankofamerica.com. If we broke into Kindergare daycare, it's very unlikely that someone is going to be chasing after us, trying to figure out what we're doing. But boy, Bank of America, that would be the place where somebody would be doing that. They're going to be interested in who owns these systems. They're going to be interested in what kind of systems are being used. If we just simply go out to Monster.com or Dice.com, if they're advertising somebody, we need somebody to get off of. We need someone to help us move our system from this version of Active Directory to this version of Active Directory. They're actually telling you what kind of systems they actually have. How many offices do we have? The more offices that we have, the more our IT infrastructure support is spread out.

When I worked at the mortgage company in Dallas, we had 987 branches around the US. We had our main sport in Dallas. So, if I were to attack one of those mortgage branches, I'd attack one of them and then ride back in on that connection to the Dallas office. What sort of connectivity do we have between the sites? Are we connected via leased lines, tone lines, or fractional T1 lines? In other words, connections that you would get from the phone company? Or are we leveraging things over the Internet, perhaps things over the Internet where we're encrypting the connection between them? What type of telephone PABX systems are being used? Now I'm going to take a different approach on this next slide, and I'm going to get into that one. "Central or decentralised It supports Centralized Its support may be easier or more difficult to deceive, but you must know where your support is located and what servers and services are accessible via the internet. I want to do this really quick example and explain to you when we were talking about the telephone and PABX system. This is something called walking the.ORG chart.

When I say I'm walking the org chart, I'm talking about the organisational chart of the company. Let's say, for example, we call in at two in the morning and we call into the help desk where Bill is the person we're trying to target. He answers the phone. This is Bill's Cheers at extension 44 21. I'm sorry, I'm not available right now. If you need meeting assistance, you can call my boss, John Sears, at extension 40 412. Then we hang up the phone and call John Sears. John Sears answers the phone. Hello, this is John Sears at extension 441 two I'm not available right now. If you need immediate assistance, you can call my boss, Greg Simmons, at extension 44 32.

We have all of the information to pull off what we're trying to do. We call Bill back and explain everything. Bill, this is Greg Simmons. Do you know who I am? Yes, Mr. Simmons. Of course I do. Unfortunately, we have a problem with your boss, John Sears. Can I definitely depend on you to keep this conversation between just us? Oh, yes, of course I can do that. I need you to reset John's password and please do not give him another one until I say so. Can you do that for me? Yes, of course I could do that. Now we've just laid the fact where Bill is going to expect to get ahead if he keeps his and moves ahead of John. Now, this is not going to work if Bill and John are good friends, but you know, any time you're trying to do foot printing, any time you're trying to do reconnaissance, you have to take a few chances. And so this is what's referred to as "walking the.ORG chart."

Prepared by Top Experts, the top IT Trainers ensure that when it comes to your IT exam prep and you can count on ExamSnap Certified Ethical Hacker v10 Exam certification video training course that goes in line with the corresponding ECCouncil 312-50v10 exam dumps, study guide, and practice test questions & answers.

Comments (0)

Add Comment

Please post your comments about 312-50v10 Exams. Don't share your email address asking for 312-50v10 braindumps or 312-50v10 exam pdf files.

Add Comment

Purchase Individually

312-50v10  Premium File
312-50v10
Premium File
322 Q&A
$43.99 $39.99
312-50v10  Training Course
312-50v10
Training Course
182 Lectures
$16.49 $14.99
312-50v10  Study Guide
312-50v10
Study Guide
1299 Pages
$16.49 $14.99

ECCouncil Certifications

Only Registered Members can View Training Courses

Please fill out your email address below in order to view Training Courses. Registration is Free and Easy, You Simply need to provide an email address.

  • Trusted by 1.2M IT Certification Candidates Every Month
  • Hundreds Hours of Videos
  • Instant download After Registration

Already Member? Click here to Login

A confirmation link will be sent to this email address to verify your login

UP

LIMITED OFFER: GET 30% Discount

This is ONE TIME OFFER

ExamSnap Discount Offer
Enter Your Email Address to Receive Your 30% Discount Code

A confirmation link will be sent to this email address to verify your login. *We value your privacy. We will not rent or sell your email address.

Download Free Demo of VCE Exam Simulator

Experience Avanset VCE Exam Simulator for yourself.

Simply submit your e-mail address below to get started with our interactive software demo of your free trial.

Free Demo Limits: In the demo version you will be able to access only first 5 questions from exam.